What is Win 10 Tweaker?
The Malwarebytes research team has determined that Win 10 Tweaker is a "system optimizer". This so-called "system optimizers" requires users to disable their anti-malware software.
More information can be found on our Malwarebytes Labs blog.
How do I know if I am infected with Win 10 Tweaker?
This is how the main screen of the system optimizer looks:

and see this warning before you can use the program:

How did Win 10 Tweaker get on my computer?
These so-called system optimizers use different methods of getting installed. This particular one was made available on a questionable website.
How do I remove Win 10 Tweaker?
Our program Malwarebytes can detect and remove this potentially unwanted application.
- Please download Malwarebytes for Windows to your desktop.
- Double-click MBSetup.exe and follow the prompts to install the program.
- When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
- Click on the Get started button.
- Click Scan to start a Threat Scan.
- When the scan is finished click Quarantine to remove the found threats.
- Reboot the system if prompted to complete the removal process.
- No, Malwarebytes removes Win 10 Tweaker completely.
We hope our application and this guide have helped you eradicate this system optimizer.
As you can see below the full version of Malwarebytes would have protected you against the Win 10 Tweaker installer. It would have warned you before the application could install itself, giving you a chance to stop it before it became too late.
And it would have blocked the website where the program was available for download.
Technical details for experts
You may see these entries in FRST logs:
(XpucT) [File not signed] C:\Downloads\win 10 tweaker.exeAlterations made by the installer:
File system details [View: All details] (Selection) --------------------------------------------------- Adds the file C:\Downloads\win 10 tweaker.exe Registry details [View: All details] (Selection) ------------------------------------------------ [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\w10t] "URL protocol"="REG_SZ", "" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\w10t\shell\open\command] "(Default)"="REG_SZ", ""C:\Downloads\win 10 tweaker.exe" buyknow"Malwarebytes log:
Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 10/6/21 Scan Time: 1:35 PM Log File: 84d29178-2699-11ec-bd4a-080027235d76.json -Software Information- Version: 4.4.7.134 Components Version: 1.0.1464 Update Package Version: 1.0.45600 License: Premium -System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: {username}-PC\{username} -Scan Summary- Scan Type: Threat Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 259385 Threats Detected: 3 Threats Quarantined: 3 Time Elapsed: 2 min, 2 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 1 PUP.Optional.Win10Tweak, C:\DOWNLOADS\WIN 10 TWEAKER.EXE, Quarantined, 14629, 977683, , , , , 12AC631DDCE30527B221CE2647026C55, C9D7CA6E47124B6B22A43986D6F21EC70C0173A2D72553595F87C6450D103E2A Module: 1 PUP.Optional.Win10Tweak, C:\DOWNLOADS\WIN 10 TWEAKER.EXE, Quarantined, 14629, 977683, , , , , 12AC631DDCE30527B221CE2647026C55, C9D7CA6E47124B6B22A43986D6F21EC70C0173A2D72553595F87C6450D103E2A Registry Key: 0 (No malicious items detected) Registry Value: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 1 PUP.Optional.Win10Tweak, C:\DOWNLOADS\WIN 10 TWEAKER.EXE, Quarantined, 14629, 977683, 1.0.45600, 57232C5A866F4990FEAABFCB, dds, 01453504, 12AC631DDCE30527B221CE2647026C55, C9D7CA6E47124B6B22A43986D6F21EC70C0173A2D72553595F87C6450D103E2A Physical Sector: 0 (No malicious items detected) WMI: 0 (No malicious items detected) (end)As mentioned before the full version of Malwarebytes could have protected your computer against this threat.
We use different ways of protecting your computer(s):
- Dynamically Blocks Malware Sites & Servers
- Malware Execution Prevention